Facial expression recognition(FER)remains a hot research area among computer vision researchers and still becomes a challenge because of high intraclass *** techniques for this problem depend on hand-crafted features,...
详细信息
Facial expression recognition(FER)remains a hot research area among computer vision researchers and still becomes a challenge because of high intraclass *** techniques for this problem depend on hand-crafted features,namely,LBP,SIFT,and HOG,along with that a classifier trained on a database of videos or *** execute perform well on image datasets captured in a controlled condition;however not perform well in the more challenging dataset,which has partial faces and image ***,many studies presented an endwise structure for facial expression recognition by utilizing DL ***,this study develops an earthworm optimization with an improved SqueezeNet-based FER(EWOISN-FER)*** presented EWOISN-FER model primarily applies the contrast-limited adaptive histogram equalization(CLAHE)technique as a pre-processing *** addition,the improved SqueezeNet model is exploited to derive an optimal set of feature vectors,and the hyperparameter tuning process is performed by the stochastic gradient boosting(SGB)***,EWO with sparse autoencoder(SAE)is employed for the FER process,and the EWO algorithm appropriately chooses the SAE ***-ranging experimental analysis is carried out to examine the performance of the proposed *** experimental outcomes indicate the supremacy of the presented EWOISN-FER technique.
Multi-agent mobile applications play an essential role in mobile applications and have attracted more and more researchers’*** work has always focused on multi-agent applications with perfect *** are usually based on...
详细信息
Multi-agent mobile applications play an essential role in mobile applications and have attracted more and more researchers’*** work has always focused on multi-agent applications with perfect *** are usually based on human-designed rules to provide decision-making searching ***,existing methods for solving perfect-information mobile applications cannot be directly applied to imperfect-information mobile ***,we take the Contact Bridge,a multi-agent application with imperfect information,for the case *** propose an enhanced searching strategy to deal with multi-agent applications with imperfect *** design a self-training bidding system model and apply a Recurrent Neural Network(RNN)to model the bidding *** bridge system model consists of two parts,a bidding prediction system based on imitation learning to get a contract quickly and a visualization system for hands understanding to realize regular communication between ***,to dynamically analyze the impact of other players’unknown hands on our final reward,we design a Monte Carlo sampling algorithm based on the bidding system model(BSM)to deal with imperfect *** the same time,a double-dummy analysis model is designed to efficiently evaluate the results of *** results indicate that our searching strategy outperforms the top rule-based mobile applications.
With the development of virtual reality (VR) technology, panoramic video, a new method that is the fusion of VR technology and panoramic video technology, have gradually emerged and developed rapidly. Nowadays, VR pan...
详细信息
Recent studies have shown remarkable success in face image generation ***,existing approaches have limited diversity,quality and controllability in generating *** address these issues,we propose a novel end-to-end lea...
详细信息
Recent studies have shown remarkable success in face image generation ***,existing approaches have limited diversity,quality and controllability in generating *** address these issues,we propose a novel end-to-end learning framework to generate diverse,realistic and controllable face images guided by face *** face mask provides a good geometric constraint for a face by specifying the size and location of different components of the face,such as eyes,nose and *** framework consists of four components:style encoder,style decoder,generator and *** style encoder generates a style code which represents the style of the result face;the generator translate the input face mask into a real face based on the style code;the style decoder learns to reconstruct the style code from the generated face image;and the discriminator classifies an input face image as real or *** the style code,the proposed model can generate different face images matching the input face mask,and by manipulating the face mask,we can finely control the generated face *** empirically demonstrate the effectiveness of our approach on mask guided face image synthesis task.
Physical adversarial attacks can deceive deep neural networks (DNNs), leading to erroneous predictions in real-world scenarios. To uncover potential security risks, attacking the safety-critical task of person detecti...
ISBN:
(纸本)9798331314385
Physical adversarial attacks can deceive deep neural networks (DNNs), leading to erroneous predictions in real-world scenarios. To uncover potential security risks, attacking the safety-critical task of person detection has garnered significant attention. However, we observe that existing attack methods overlook the pivotal role of the camera, involving capturing real-world scenes and converting them into digital images, in the physical adversarial attack workflow. This oversight leads to instability and challenges in reproducing these attacks. In this work, we revisit patch-based attacks against person detectors and introduce a camera-agnostic physical adversarial attack to mitigate this limitation. Specifically, we construct a differentiable camera Image Signal Processing (ISP) proxy network to compensate for the physical-to-digital transition gap. Furthermore, the camera ISP proxy network serves as a defense module, forming an adversarial optimization framework with the attack module. The attack module optimizes adversarial patches to maximize effectiveness, while the defense module optimizes the conditional parameters of the camera ISP proxy network to minimize attack effectiveness. These modules engage in an adversarial game, enhancing cross-camera stability. Experimental results demonstrate that our proposed Camera-Agnostic Patch (CAP) attack effectively conceals persons from detectors across various imaging hardware, including two distinct cameras and four smartphones.
Recent advancements in deep learning for image classification predominantly rely on convolutional neural networks (CNNs) or Transformer-based architectures. However, these models face notable challenges in medical ima...
详细信息
Fire is one of the most common disasters for human beings. It is also one of the disasters that cameras can easily catch. In order to detect a series of building fires efficiently, a fire image detection algorithm bas...
详细信息
Row Parallel Coarse-Grained Reconfigurable Architecture(RPCGRA)has the advantages of maximum parallelism and programmable *** an efficient algorithm to map the diverse applications onto RPCGRA is difficult due to a nu...
详细信息
Row Parallel Coarse-Grained Reconfigurable Architecture(RPCGRA)has the advantages of maximum parallelism and programmable *** an efficient algorithm to map the diverse applications onto RPCGRA is difficult due to a number of RPCGRA hardware *** solve this problem,the nodes of the data flow graph must be partitioned and scheduled onto the *** this paper,we present a Depth-First Greedy Mapping(DFGM)algorithm that simultaneously considers the communication costs and the use times of the Reconfigurable Cell Array(RCA).Compared with level breadth mapping,the performance of DFGM is *** percentage of maximum improvement in the use times of RCA is 33%and the percentage of maximum improvement in non-original input and output times is 64.4%(Given Discrete Cosine Transfor 8(DCT8),and the area of reconfigurable processing unit is 56).Compared with level-based depth mapping,DFGM also obtains the lowest averages of use times of RCA,non-original input and output times,and the reconfigurable time.
In mobile systems, memory can be compressed page-by-page to save space. This approach is widely adopted because memory data is accessed by page. However, this paper shows that the system response speed is significantl...
详细信息
To meet the future system requirements of Cloud Computing Services (CCSs) for large numbers of users, multiple services and high efficiency, authentication and access control technologies will evolve in a more secure ...
详细信息
暂无评论